Tuesday, October 9, 2012

Are we independent??


Every one watching the local Television stations will bear with me that every one has been notified about 9th October 2012. The city (Kampala) has been repainted with the national colours. Waking up one of the mornings, I found every media house talking about 'Ug @ 50' which amplified my thinking about the whole saga.
True, Uganda as a nation, the national flag, the national anthem and the national court of arms and a few Ugandans are making 50 years come 09th October 2012. however, one wonders whether we are really 50 years of age.
With over 7.5million people below the poverty line, it keeps me wondering what we have been doing for the last 50 years. Have we been walking ahead, backwards, or standing? Many people and many more are going to bed (if they have one) with out a meal. This is worsened by the increasing diseases. There are many diseases that kill people and yet these diseases could have been dealt with. In this current time and age, why should some one die of Malaria? Why should some one have polio? At 50 years these are some of the things we should be reading about in the historical books.
With a nearly one out of every five children in a country not educated, it is truly alarming if you are still celebrating 50 years of independence. This figure is even worse when it gets to girls in rural areas who have to leave school for early marriages and because the parents cannot afford the very little asked at school.
Uganda is among the countries with alarming rates of child mortality. The life-expectancy at birth is particularly low. It still goes with out saying the life-expectancy of the country is below 60 years. Life is not a guarantee in Uganda, yet we are independent.
With the national Unemployment standing at 80% and under employment at 17%, I still wonder whether independence was to benefit us or to hurt us. It is a level in time where we should be comparing parameters back in time and smile but the reverse is true for the employment sector. With the increasing graduations in the different tertiary institutions, this percentage can only grow.
A country that boosts of an agricultural economy, to find people dying of hunger is a laughable issue. You would expect a lot many problems in undeveloped nations that are agricultural but not hunger. Here you are, you are too lucky a person that U will find both in Uganda that plans to celebrate a golden independence jubilee.
Some of the good infrastructure we are proud of were developed in the per-colonial times with little or no development added to them. The country boost of the worst infrastructure with the few developments done by funders like World bank and the European Union, etc. With over 70% of the population not on the national power grid, and less than 10% of the road network tarmacked, I don't see whether we are 50 years of age.
Right now, we are talking about the information age, where the Internet is the major driver of every thing, including development. Many countries even the ones we think we are older than are far better than us when it comes to this. If you took a look at the population, very few people can surf around the Internet, leave alone use it for their work. With the poor infrastructure, and poor governance, no one ever expects to see an Internet penetration close to 100% even by Ug@1000, in the next
50 years.
Independence is the ability of a person or state to stand with out interference of support from any one. The support can be financial, in-kind support, or political. Now that we are still making deficit budgets with financial donations still showing up on our budgets, are we independent yet?
The 1962 function has been defined as a process in which the white man handed over the colonial powers to other black colonial masters. Uganda transferred it's colonial masters from white to black. The bad story is that the blacks who took over this power where inhuman, never cared and worse than then whites.
The major reasons all these problems have been hitting on the same nation is because of poor governance and corruption. Uganda is among the very few countries that condone the worst act of corruption. No wonder the country has no functional water system, railway system, health system, Road system and every thing is rub by propaganda. Uganda is also infected with a problem of leaders who don't know how to set priorities. How can a third world country equip it's self with the state of art military machinery as if it were a world super power preparing for war, or a security company ready to be hired for war and the benefits could help the citizens?
Someone has ever asked me why Kenya, Singapore and the likes are too far developed yet we are more endowed as far as resources are concerned and we were even better than then in terms of development way back in 1962? What went wrong? Who cursed us?
If it came to enlisting the status of Uganda, I don't think I cannot stop but that's not what brought me today. What I wanted us to look at today is,; As we celebrate 50 years of independence, we need to establish what has been reached at, and what has been missed. For what has been reached at, we need to find strategies of how to consolidate on them and use them to find what has eluded us.
So my Question still stands; with all the unreached population, with public services, should we go ahead and spend that so many million dollars on one day of Golden celebrations?


REFERENCES:


Saturday, October 6, 2012

Our Online Safety and Privacy-What can we do to maintain it?


Even in the developing nations, Internet is respected as an enabler. No doubt about this as more and more people are using Internet to go about business. Statements have come out predicting that by the year 2022, Internet will be a 'must' of life. In the same line the UN is moving to make broadband access a human right. It is with no doubt now that Internet is moving to rule our lives, in education, medicines, communications (emails and so on), banking, society (through social media like Facebook, Twitter, etc) and generally in the way we live our lives.
As we move around the Internet, we often find problems, either people with bad intentions or our poor enlightenment which might end up being costly to us. The problems on the Internet might include, although not limited to:
a) Cyberstalking: Cyberstalking is a technologically-based “attack” on one person who has been targeted specifically for that attack for reasons of anger, revenge or control. Cyberstalking can take many forms, including embarrassment, accusations, monitoring, making threats, harassment or gathering information in order to harass and humiliate the victim.
b) Identity Theft: Identity theft occurs when someone uses your personally identifying information, like your name, Social Security number, Email Address credentials, or credit card number, without your permission, to commit fraud or other crimes.
c) Spam and Unsolicited communications1: Spam is the use of electronic messaging systems to send unsolicited bulk messages, especially advertising, indiscriminately. The hidden dangers of spam is that; Eight out of ten spam emails contain covert tracking codes that enable the sender to record and log recipients' email addresses as soon as a message is opened.
d) Hackers: A hacker is someone who finds weaknesses in a computer or computer network, though the term can also refer to someone with an advanced understanding of computers and computer networks. The dangers of Hackers range from petty theft of little information from your computer to state sponsored crimes like state attacks. Hackers can at times be taken under identity theft or vise versa.
e) Con-men and Scammers: These are people who tell stories that are too good to be true in a way of winning your heart with intentions of stealing from you. They are too common on the Internet mainly through email and other social networks now days. They will either exploit your wish to make quick money or your sympathetic heart to cheat you.
The different harmful people and activities cannot be enlisted and finished in this paper but they are many and we are assured, they are going to increase as Internet develops.

What should be done?
Just like in any security related scenario, your best way out is your defense and your defense is your curiosity and keenness.
1) When on the Internet, don't click on links you are not sure of. Some of these links can install Malware on to the computer. Malware is short for malicious Software which has a potential to gathering sensitive information or gain access to private computer systems. It could be a virus, worm, Trojan, spyware or Adware. There are many tempting links on the Internet which will entice your eyes and these are well designed to force your hand into clicking. Don't touch them unless they are linking to a website or program you know and intend to use.
2) In addition to suspicious links on the Internet, a number of suspicious softwares are given to us to install on our computers. Some of these softwares are used as back doors into our computers by hackers. Only install programs that you know their use and source. Things like 'Updates are available for installation' will drag you into thinking that the updates or softwares are legitimate yet they are dangerous. In addition to suspicious links, don't allow browser pop ups. Pop ups are web browser display windows that suddenly appear in your active display window intended to attract web traffic or capture email addresses. If you are not knowledgeable enough about some thing, it is advisable to ask those who you think know.
3) Filling online forms: In a number of times we are presented with online forms to fill. These forms have spaces of email address, contact address and passwords. You find people providing their true email addresses, with at times their passwords. If you asked these people why they fill such forms, you will be baffled by their response(s). Some will tell you that they thought it was a requirement to access the web page, and so many others. The trick here is, never to fill forms unless you know what it is meant for and unless you have requested for the form. These forms are used for information gathering, a very popular trick in spamming.
4) Use strong Passwords and protect your password jealously. There are programs out there that test usernames and passwords into applications and passwords that appear in the dictionary, simple alphanumerical characters like 'paul123' don't need more than an hour to be cracked. Online applications today enforce strong password cultures although some are still backwards as regards this. A strong password should at least contain a Cap, Numeral, and an Alphabetic letter with more than six characters. Passwords with special characters like '@,#,$,%,^,&,*,' etc are the hardest to crack. As part of good password cultures, we are encouraged to always change our passwords periodically (year). Remember to make a password strong, hard to crack but simple to remember. Avoid bad habits of writing passwords on papers because they are too hard to remember.
5) Password memory and Full time log in. Many applications, have options of 'Leave me logged in' and 'Remember my ID and password'. Although these are good for speedy web-browsing and password memory since we have many to remember, they are very dangerous habits. At times people use them on public computer for example computers of friends, Internet cafe computers and school or university computers. With these options, we are only weakening the work of Hackers and identity thieves. Make sure these 'check boxes’ are not ticked before clicking the login button. As a policy, always remember to logout your account after use. If in a cafe, use the last five minutes to logout your accounts. When the cafe session screen appears on the monitor, it doesn't mean that your accounts are logged out; it only means you cannot access your accounts. If someone activates the session, it will continue with your account.
6) Clear Cookies in your web browser as often as possible. A cookie is a small piece of data sent from a website and stored in a user's web-browser while a user is browsing a website. When the user browses the same website the date stored in the cookie can be retrieved by the website to notify the website of the users' previous activities. Cookies wouldn't have been dangerous if other dangerous people never looked for them from our computers and used them for their purposes like marketing, login information gathering etc. As you move around the Internet you click on many things, these things you click on depict your likes, and dislikes. If this information is stored on the computer in the browser, it is almost available to all the people on the Internet, that is, if they want it. The security or defense is to remove it very often. Most web-browser cookies can be cleared under the 'Tools' menu and 'Clear recent history' or specifically you can look for help in different browsers.
7) Desist from the habit of sending (forwarding) spam. We have already talked about spam in the previous paragraphs and its dangers. Spam propagation is a hard part for those in the business and the best way to reducing running costs is through every day people, people we trust. We often receive mails that ask as to resend or something will happen, mails that are meant to educate us about some thing but force use to forward them as they are. Chances are high, these mails have background code and this code is being executed every time the mail is opened. You and me as naive users, the best work we can do for the SPAM companies is by propagating this spam.
8) Where possible use secure web browsing. Normal web-browsing is done through http (hyper text transfer protocol) and this is the most common mode of web-browsing. Now days, a number of websites are provided over both http and https. The 's' at the end of https stands for secure. It thus means that browsing over https is a little more secure and it provides a little more secure environment for business transactions. If a website offers both https and http, please choose https.
9) Have an updated Anti-virus, Firewall, Anti-Spyware, Anti-Adware and Anti-Malware program on your computer for those that use them. For all the problems we have talked about, some of these applications can be of use. Although some of these programs are costly, intended to attract web traffic or capture email addresses the cost is not equal to what you would loose if any of the problems mentioned above ever happened to you. Now days all these applications can be sold in single software and many software (Anti-virus) companies are combining them in one package, making work easier.

Finally but not least, we need to pay attention to all that the computer tells us through warning messages and where possible ask if you are not sure. At times the notifications on the computer are misleading and yet at time they are critically informative. It is through reading, experience and inquiry that you can know which one is misleading and which one is safe. As we have seen, it is not any ones work to have our privacy and security on the Internet but our own. Those days, it used to the work of IT support officers and security engineers to ensure our security on Internet, but things have changed. We deal with the Internet more closely, more frequently and more personally that the IT teams are no longer fully responsible for our security. I therefore call upon you all to educate those around you and take these few skills and others you might have into action to minimise losses and pain on the Internet as we strive to have a healthier and cleaner Internet with no crime.
1 http://www.information-age.com/articles/295441/the-hidden-danger-of-spam.thtml
 

Friday, August 3, 2012

Internet penetration and Reading culture in Developing countries


It has always been stated that the best way to hide information from an African is by writing it. Africans are well known for the poorest reading habits. Every motivational talk I have attended, has had to mention reading as the best way to redeem Africa. Reading, on a number of cases has been sought after as the best way to run away from the cyclic cycle of poverty affecting the developing countries. Finding the number of people in Africa who can read a book and complete it is a tricky task. Many people have always blamed this problem (poor reading) to limited availability of reading materials. Most of the materials are for sale, at prices most people would not want to reserve for reading purposes.
With the invent of web 2.0, more information has been readily availed for almost all people who can access even the slowest Internet. The past five years have seen most of the African countries more than double their Internet Penetration numbers1. Internet has become cheaper, and more available on the move.
There are no concrete numbers on our reading habits and the increasing availability of Internet but many people are arguing that it is not the absence of what to read that created this bad reading habit, but the culture. A lot of information is available in the print media, either free of charge to access but not all is read.
Recently, on one of the discussion forums2, (I-network) we discussed how government was looking at facilitating Members of Parliament (MPs) with laptops, smart phones (actually Ipads) to have more access to discussion documents while in house or any where because some MPs complained that the printed reports are just bulky. It however was deduced that this will not change the reading habits of the house. MPs will continue coming to the floor with out information about the discussion topic.
With the advent of web 2.0 Internet, Internet use and reading has increased but what is discussed is fun, jokes, obnoxious news and some few quotes. Social networks are now responsible for over 28% of Internet Penetration in Africa3. It is very hard to find some one reading and linking other friends to some piece of good reading material if it is developmental. If some one does share material, very few people will follow it, but let it be a joke, nude pictures, music and name it in that line, the followers will be in millions.
Can some one comfortably state that developing countries where cursed when it comes to reading and nothing will ever change the trends? Do you think the higher Internet penetration will ultimately change the course with time? How can we use this almost free resource (Internet) to advance our reading culture as we know reading is knowledge and knowledge is wealth; a better way to move away from the enslavement of poverty.

REF:
 
1http://royal.pingdom.com/2012/04/19/world-internet-population-has-doubled-in-the-last-5-years/
2http://next.dgroups.org/iicd/i-network/
3http://www.internetworldstats.com/stats1.htm

Sunday, July 22, 2012

Internet bundling and it's effects to Internet penetration in developing countries


Internet bundling and it's effects to Internet penetration in developing countries
East Africa being a community of developing countries, has been blessed with the appearance of three submarine cables* at the East African coast. Coming from satellite Internet which is known to have a minimum round trip time of 500ms to optic fibre Internet which reduces the round trip time to even less than 10ms, every thing in Internet speeds and Internet bandwidth has increased at the coast and in the inlands of the East African community. More Internet can be accessed on the move (mobile Internet), more people are becoming abreast with the Internet and the different terminologies, more Internet service providers, more content is being developed and more innovations are coming up in the world of Internet. If all that is not enough, many countries have developed Internet Exchange Points (IXPs) which help in reducing the time to access local content and also develop the capacity of local content creation. The case here in Uganda is the Uganda Internet Exchange Point (UIXP). When Uganda only had satellite ISPs (Internet Service Providers), Internet was expensive, slow, and limited the access to some websites like torrent sites. Although with the increasing number of ISPs, most of these limitations have been done with, but a new innovation has been noticed. Those days, Internet was sold in the whole, meaning you paid for a service and it did not matter how you used the service. These days, even after paying for the service, there is a limit to how much of the data you can download and upload in a particular period of time. This phenomenal is referred to as data capping or data bundling in Internet terminologies.
How has Internet Bundling affected Internet usage?
With the advent of social networks and the entire web 2.0, a lot of content is available, more people are living life on the Internet and more people are joining the Internet. As more demand for the Internet grows, the supply seems to be constrained which leaves people demanding for more. Those who cannot afford the bundles are left to access Internet in corporate offices, Internet cafes and friends computers where possible. This leaves this type of population with out service. Some people still believe that once they have paid some money to the ISPs, they should be let to use the Internet freely with out boundaries. They further assert that, it is because of these boundaries that innovations and some initiatives are limited as some content will require more bundles than other content, which brings in the topic of net neutrality. There are questions like, who uses the unused bundles at the end of the month? Why should ISPs buy unlimited Internet and resell limited Internet? This school of thought therefore confirms that if Internet bundling is stopped, East Africa will even realise deeper Internet penetration.

From the other side of the corridor, is a group of people who believe that it is because of these bundles and these limitations that we can even enjoy the speeds we are talking about. Although there is more capacity available at the coast due to the optical fibres, the ISPs are let trunk space which is a resource. This resource will be unusable by a good part of society if not well managed. If we allow a group of people to clog and monopolise it with some 'capacity-eating' content, other people will not be able to use it yet they have paid for the service. This introduces a topic of fair user policy. It is upon this argument that ISPs limit on how much someone can download and upload even after paying for a monthly subscription. People in finance also believe if it was not for data capping, Internet wouldn't be a good business to invest in. Because of this bundling business, ISPs can be able to sell more and more bundles and accumulate some profits. Some one has once told me that if it was not for data bundling, it would be hard for people with low income to even afford that small Internet. When Internet is bundled, every one is allowed to buy a portion depending on what he wants and what he can afford. Since we are a majority of low income earners, the only way we can access Internet is by buying small affordable bundles.
Each side of the corridor has more points to put across as regards this topic but these are the fundamental basics. It is upon these basics that I would wish to engage you (my reader). Do you think bundling of Internet has hampered the speed and depth of Internet penetration in developing nations? Would the situation be better without bundling?
Your Opinion is much appreciated.
*Seacom, TEAMs and EASSy

Friday, July 20, 2012

Online Child Labour


As we talk about child rights and child protection on the Internet, a new word in this vocabulary has been developed, 'online child labour'. Although it is a set of words, I strongly believe it is coming down too fast. As the UN has always been fighting against child labour and other child exploitation practices, there is a possibility that no one had ever thought about child labour on the Internet.
In this week's cybersecurity course we have been intensively discussing child protection and it emerged that a number of minors have been used to perpetuate different cyberattacks either with their consent or unknowingly. A number of kids are now being used in online jobs and another good number of kids are looking for online jobs.
As we might note, most of the cyber regulations are not very clear about this topic and many children are doing work online under the sheath. Children have been used in online gaming, and other online job market since the situations are now becoming convenient for them to work online. The internet is becoming cheaper and more readily available, more mobile Internet devices are becoming available at even cheaper costs and the information about online jobs is also increasingly becoming available. All the key driving factors are now favouring online jobs for kids. The situation worsens in developing countries where the children even want the jobs because of the poor living conditions they have and the money is available. The report from UN shows that children are busy in jobs but no numbers are implicated for online jobs, meaning there are no details about this act.
From this situation, the kids are at times not paid or even paid less, some times used in dangerous acts like attacking different services.
It is on this note, that I would want to engage you. Do you think children are being used in 'online child labour' and no one has been following it? Is there some thing that can be done to stop the vice before it even escalates? Besides is it wrong to have kids working, moreover it is online!

Your view is badly wanted.

Friday, July 13, 2012

Thomas Kizito: Who to blame on poor online security

Thomas Kizito: Who to blame on poor online security: Today we all woke up to another bitter truth of another public big figure of the Internet being hacked into and details of users' credential...

Who to blame on poor online security

Today we all woke up to another bitter truth of another public big figure of the Internet being hacked into and details of users' credential posted on websites. The hacking into yahoo described as a union-based SQL injection that managed to exploit 450K users' credentials joins the rest that had happened, the ones we were trying to forget like the linkedin incident.
The credentials of 'Username' and 'password' exposed on the  website by a hacking group calling themselves d33d indicated that more people used weak passwords including 'password123' which are easy to crack even by some one doing the first try. This shows a sign of weakness on the side of service users on the Internet.

Another link shows that these credentials were stored in plain text even for the passwords with out a single hashing algorithm. This reminds me that even my simple Linux Mint Laptop stores passwords in a shadow file which will take you some good time to crack even if you came across the file. One wonders why Yahoo, a giant firm could do such a great mistake?

In another angle, we have seen companies enabling 'strong password' rules for all those who wish to open up accounts with them. These strong password rules are all over the web which include but not limited to, having an alphanumerical password with a capital letter. Having a password phrase longer than 6 characters and other things. But the same report showed that some people had passwords less than three characters, passwords like, 'qwerty', '123456' and so many others. Why could Yahoo of all companies allow such passwords on their network in the first place.

I wouldn't want to mention the firewall and network security to avoid things like Injections because those ones are a little more complex but a company of yahoo's strength and financial standing, would be able to invest in any sort of security measures.

It is on this note that I ask, who would you blame for the rampant hacking of user credentials on popular networks? Would you take the users as weak and lazy, or the providers as people who don't mind about security?

Saturday, June 30, 2012

Are African countries ready for the analog switch off?



A big number of African countries have their Television broadcast and received in analog mode over the terrestrial air waves. With digital transmission, the picture and audio of the television station are converted into corresponding binary form (ones and zeros), then subjected to a number of digital manipulations before being transmitted.
Digital transmission allows for better use of available frequency resources allowing other services to be transmitted over the same airwaves at the same time freeing up frequencies for other services. Terrestrial digital television encourages an increase in the number of programmes available, improves quality and accessibility and creates new media services. It also provides for better Television viewing experience as it provides better picture and audio quality. It adds ability for interactive TV and at the same time flexibility to the broadcaster.
Today, these various benefits of digital transmission make a move to digital broadcasting (known as digital migration) imperative for television and radio. This is why the International Telecommunications Union recommended, in the Regional Radiocommunications Conference, 2006(RRC-06), all countries to move to digital broadcasting by the year 20151. From this conference, it was resolved that the International Telecommunications Union (ITU) would not protect any analog Television broadcasting, meaning analog TV signals will be susceptible to interference from different transmitters thus suggesting an analog switch off. By analog switch off we mean stop support for analog transmission and only support (allow) digital.
To this note, ITU has provided consulting services for broadcasting infrastructure development. It has developed reports and guidelines needed for the Analog to digital transition2. The ITU has also provided training in different places and provided close cooperation with regional broadcasting organisation through regular workshops and seminars. It has performed spectrum allocations and wave propagation recommendations, provided a white paper about the transition from analog to digital terrestrial broadcasting and examined terrestrial digital broadcasting technologies through research on the topic.
Africa as a continent, and the African Union in particular the African Telecommunications Union (ATU), has Developed a roadmap on digital migration that involved frequency coordination on transition, timelines and way forward to make sure the deadline by ITU is beaten. ATU has developed a Digital Migration and spectrum policy through a number of consultation meetings and in collaboration with ITU, regional telecommunications bodies and commercial firms in the telecommunications market. It has also held a number of follow-up meetings3 with different regional bodies to monitor progress by different regional bodies and independent nations and harmonise systems for a smooth beating of the ITU deadline.
It however looks like over 42 African countries4 out of the 54 are unlikely going to meet the ITU deadline. In the East African Community, Burundi, Uganda and Southern Sudan are listed among these countries. 35 countries had not announced the schedule timetable of events, four countries were still affected by Civil unrest, seven had come up with policy papers and or a Task force as to this effect, four were above the schedule of the policy by at least 6 months, six had piloted the policy, nine had launched with only one completed (Mauritius) by 29th November 2011.

Uganda as a developing country, formulated a body (Digital Migration Working Group) that spearheaded the process of policy formulation under the ministry of Information and communications technology. This body finalised on the Digital Migration Policy in April 20115 which policy instituted another body (Digital Migration Task Force) tasked to run the process of the digital migration. The government through the mentioned bodies started a campaign of massive public awareness through different existing television channels supported by the Uganda communications Commission. The switch over time table was also generated which was supposed to have three years of dual-Illumination with the national analog switch-off date set for Dec-2012.

Challenges to speedy digital migration
Just like other countries in Africa, Uganda faced a problem of financial limitations, with questions of where were the funds going to be received from. Well knowing that the transition takes at least some years and costs so much and immense influence on society, economy and industries, Uganda was not ready for this challenge. Politics in most of the African countries has been a problem to an extend some countries have not had a running government for a number of years. Policy frame work alignment was also a problem in some African countries where it took too much time to come up with a working policy and even after this policy, the deadline was near coming. National priority remained a challenge is some countries where this matter never made to the top five of national discussion items in some countries. Stakeholder awareness remains a challenge and a number of people are not aware of what is going on.
It is however urged that some Countries can remain in the analog TV transmission even after 2015 basing on the little publicized fact that the 2006 treaty allows for an additional five years for a total of 30 African nations beyond the 2015 cut-off point6. (Most Latin American countries, incidentally, have agreed to a switch-off of analogue TV transmissions around 2020). In other words, more than two-thirds of the countries on the African continent are exempt from the 2015 deadline, and instead have a 2020 switch-off date, even though some have voluntarily committed to the earlier time in agreements in regional fora and/ or through domestic policy decisions. Even still the RRC-06 decision stops ITU from intervening to protect a country’s TV broadcast signals in any instances where these are being swamped by a neighbour’s, unless those signals have been switched to digital. In reality, however, this issue of signal swamping or cross-border interference with signals is not a serious issue in most African countries. On the contrary, huge swathes of the African population still do not even receive TV broadcasting signals of any sort, or at best can pick up a single national TV channel. In other cases, African audiences welcome spill-over across borders, which may offer a little more choice. The point then is that African countries can probably still continue analogue TV long after deadline without really any incurring serious disadvantages in terms of aggressive neighbouring broadcasters bothering their national signal space. The few disputes that may occur will not necessarily even require ITU intervention to resolve.
Successful Migration requires Strong leadership of government, Firm decision of analogue TV switch-off, Close cooperation of Regulator and market parties, Clear and timely regulatory framework and Adequate information and assistance to viewers7.
A group of people recommend that satellite coverage would provide a cheaper short to medium term alternative as countries are sorting out their houses to get ready for 2015. Countries to subsidise decoders which cost significantly high could also enable the process. Since in some of African countries TV is still under a government monopoly, opening up the business to private investors to allow innovations and investment in the move.

It is from this note that one wonder whether African countries are doing enough to get ready for the analog switch-off. What do you think should be done for these countries to be ready for the deadline. Do you think African countries will continue with analog TV broadcasting even after 2015?

Your view.



1http://guyberger.ru.ac.za/fulltext/Digitalmigration.pdf
2http://www.itu.int/ITU-D/tech/digital_broadcasting/project-dbasiapacific/Digital-Migration-Guidelines_EV6.pdf
3http://atu-uat.org/index.php/en/events-calender
4 http://www.gsma.com/spectrum/wp-content/uploads/DigitalDividend/DDtoolkit/uploads/assets/downloads/04/analogue-to-digital-migration-in-africa.pptx
5http://www.ict.go.ug/index.php?option=com_docman&task=doc_download&gid=56&Itemid=61
6http://www.computerworldzambia.com/articles/2010/01/28/itu-extends-digital-migration-timetable-34-countries
7http://www.gsma.com/spectrum/wp-content/uploads/DigitalDividend/DDtoolkit/uploads/assets/downloads/04/itu-activites-on-digital-migration.ppt

Saturday, February 4, 2012

Windows XP hanging on the windows logo

When windows XP is started in safe mode, it starts fine but when started in normal mode, it will try loading but hangs with a windows XP logo and the progress scroll bars at the bottom.
This happened to me on a computer I never wanted to format because of one of the applications that were installed on the computer. Many google searches I came across on the Internet, were taking me to backing up all the data in safe mode and reinstalling a new copy of windows XP (format).
I almost gave in to formatting the computer after sitting on it for two days, but as I almost did the format, I remembered a saying, "Before you give up, make the last try". My last try was however successful.
What did I do? In the first place, I would like to explain the actual problem.
Many people almost nailed the cause of the problem but I never got through with their help. They all pointed to either a hardware that was conflicting the booting process or a malware that had either eaten away or replaced a dll file required for loading a device with an infected file.
When I installed a parallel XP to scan for viruses on the entire computer, I only found two virus instances in system information directory. I tried with different antiviruses and all showed that the computer was clean. This actually pointed me to eliminating a virus problem. The possibility of having a Hardware conflicting the booting process was ruled out the moment the parallel installation worked fine. However on numerous repairs to the primary XP installation, a dll file failed at (34 minutes) Hardware installation process. This now pointed me to a possibility of a missing dll which when copied to the actual required location, didn't solve the problem still. I finally decided to use the new parallel installation to compare the Device manager with the primary installation. That is when I realised that Nividia Driver was the one messing me up. I uninstalled all nividia drivers from the primary installation and thank God, the booting process succeeded.
The next time this occurs to you, uninstall any possible device from the Device manager, and repair the installation. It will clear and then reinstall the devices. You shall have a clean (almost new) installation.

Thank you.